General
-
Target
dfab39074810b9c7a71c3c02452f546b27e34353f3a0f7b7c97d04e4f7839a39
-
Size
810KB
-
Sample
241105-x9v3cszlaq
-
MD5
344e2dabb6b1d82ab0e54cfd3e763051
-
SHA1
27ec489cea888a8f2782134889afff5c82b3bc9a
-
SHA256
dfab39074810b9c7a71c3c02452f546b27e34353f3a0f7b7c97d04e4f7839a39
-
SHA512
1831eea67c29c06cb9456d2e0e352aff98fa2546a686a1aca1b6b3a0b962bbc1e0116672c7d065c8eb9aaf67f6c57caf8651c8dcab8b113140f4bf08dbc918cd
-
SSDEEP
12288:tMr4y90cWcf2C1iKx9Zfm9bxLjnscLQeDPuUAPZ7gAlucSpB48P9gwNJ:xyzWu2ClfilLQc0kwp1erPN
Static task
static1
Behavioral task
behavioral1
Sample
dfab39074810b9c7a71c3c02452f546b27e34353f3a0f7b7c97d04e4f7839a39.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
dfab39074810b9c7a71c3c02452f546b27e34353f3a0f7b7c97d04e4f7839a39
-
Size
810KB
-
MD5
344e2dabb6b1d82ab0e54cfd3e763051
-
SHA1
27ec489cea888a8f2782134889afff5c82b3bc9a
-
SHA256
dfab39074810b9c7a71c3c02452f546b27e34353f3a0f7b7c97d04e4f7839a39
-
SHA512
1831eea67c29c06cb9456d2e0e352aff98fa2546a686a1aca1b6b3a0b962bbc1e0116672c7d065c8eb9aaf67f6c57caf8651c8dcab8b113140f4bf08dbc918cd
-
SSDEEP
12288:tMr4y90cWcf2C1iKx9Zfm9bxLjnscLQeDPuUAPZ7gAlucSpB48P9gwNJ:xyzWu2ClfilLQc0kwp1erPN
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1